Sciweavers

1151 search results - page 126 / 231
» Modelling Digital Circuits Problems with Set Constraints
Sort
View
174
Voted
SACMAT
2009
ACM
15 years 10 months ago
Towards formal security analysis of GTRBAC using timed automata
An access control system is often viewed as a state transition system. Given a set of access control policies, a general safety requirement in such a system is to determine whethe...
Samrat Mondal, Shamik Sural, Vijayalakshmi Atluri
ECCC
2008
168views more  ECCC 2008»
15 years 3 months ago
Algebrization: A New Barrier in Complexity Theory
Any proof of P = NP will have to overcome two barriers: relativization and natural proofs. Yet over the last decade, we have seen circuit lower bounds (for example, that PP does n...
Scott Aaronson, Avi Wigderson
ECCV
2010
Springer
15 years 7 months ago
Detection and Tracking of Large Number of Targets in Wide Area Surveillance
In this paper, we tackle the problem of object detection and tracking in a new and challenging domain of wide area surveillance. This problem poses several challenges: large camera...
BIBE
2007
IEEE
159views Bioinformatics» more  BIBE 2007»
15 years 7 months ago
Non-negative Tensor Factorization Based on Alternating Large-scale Non-negativity-constrained Least Squares
Non-negative matrix factorization (NMF) and non-negative tensor factorization (NTF) have attracted much attention and have been successfully applied to numerous data analysis probl...
Hyunsoo Kim, Haesun Park, Lars Eldén
161
Voted
ICDCS
1995
IEEE
15 years 7 months ago
Analysis of Resource Lower Bounds in Real-Time Applications
Tasks in a real-time application usually have several stringent timing, resource, and communication requirements. Designing a distributed computing system which can meet all these...
Raed Alqadi, Parameswaran Ramanathan